Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

4/24/2009
02:11 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

SANS: Newest WLAN Hacks Come From Afar

Expert warns of deadly combination of long-distance remote and wireless hacking to get inside an organization

SAN FRANCISCO -- RSA CONFERENCE 2009 -- An attacker doesn't need to be in physical proximity to hack your wireless network. In fact, a more sophisticated wireless attack doesn't use RF at all, according to a SANS security expert here at RSA.

Ed Skoudis, founder and senior security consultant for InGuardians and a SANS instructor, said a deadly combination of long-distance remote and wireless hacking to get inside an organization is one of the potentially more dangerous new attacks to look out for.

"You assume an attacker must be nearby for a wireless hack. But the really long-distance wireless hacks don't use RF at all," Skoudis said in a SANS presentation on Thursday bout dangerous, new attack techniques. "There have been advances in wireless hacks where they are used in combination with other [attacks]."

This type of attack typically begins with a remote exploit on a Windows machine visiting an infected Website, which then uses the machine as a "wireless drone," he said. "That lets the attacker turn on the machine's wireless interface, look around, and exploit it," Skoudis said. "This is a tremendously useful attack for bad guys."

The good news is that this type of attack is tough to execute in Windows XP. But not so for Vista or Windows 7, where the API calls make it relatively simple to write code that talks to the wireless interface, according to Skoudis.

Tools such as Vista Rfmon, which puts Vista into monitoring mode, can be used to sniff wireless traffic to and from the infected client. "The attacker uses the command shell to turn the wireless interface on to install Vista Rfmon to sniff all that's going on wirelessly with the client...and that can be done [from] halfway around the world."

And if the victim's machine has access to other wireless access points, the attacker can hop from AP to AP, he said.

"These attacks aren't going after individual systems here," Skoudis said. "They are attacking networked environments, and viewing their goal as jumping into one machine to compromise an entire network to find PII [personally identifiable information]."

A few ways to defend against such a combined attack include deploying two-factor authentication on your WLAN, separating the WLAN from the wired network via VLANs or separate physical networks, and hardening wireless client configurations so they can't easily be abused, Skoudis said.

Skoudis said organizations need to shift the way they look at securing their networks. "Instead of spending 90 percent on prevention, take 5 or 10 percent and rededicate it to identifying and eradicating the bad guys," he said. "Then you're helping do a better job at prevention. Our focus has been stopping the attack from getting in...but rooting out the bad guys is a better way to spend money on prevention."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
US Sets $5 Million Bounty For Russian Hacker Behind Zeus Banking Thefts
Jai Vijayan, Contributing Writer,  12/5/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19719
PUBLISHED: 2019-12-11
Tableau Server 10.3 through 2019.4 on Windows and Linux allows XSS via the embeddedAuthRedirect page.
CVE-2019-19720
PUBLISHED: 2019-12-11
Yabasic 2.86.1 has a heap-based buffer overflow in the yylex() function in flex.c via a crafted BASIC source file.
CVE-2019-19707
PUBLISHED: 2019-12-11
On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service can occur via PROFINET DCE-RPC endpoint discovery packets.
CVE-2019-19708
PUBLISHED: 2019-12-11
The VisualEditor extension through 1.34 for MediaWiki allows XSS via pasted content containing an element with a data-ve-clipboard-key attribute.
CVE-2019-19709
PUBLISHED: 2019-12-11
MediaWiki through 1.33.1 allows attackers to bypass the Title_blacklist protection mechanism by starting with an arbitrary title, establishing a non-resolvable redirect for the associated page, and using redirect=1 in the action API when editing that page.